Description
Camel-CXF and Camel-Knative Message Header Injection via Missing Inbound Filtering

The CXF and Knative HeaderFilterStrategy implementations (CxfRsHeaderFilterStrategy in camel-cxf-rest, CxfHeaderFilterStrategy in camel-cxf-transport, and KnativeHttpHeaderFilterStrategy in camel-knative-http) only filter outbound Camel-internal headers via setOutFilterStartsWith, while not configuring inbound filtering via setInFilterStartsWith. As a result, an unauthenticated attacker can inject Camel-internal headers (e.g. CamelExecCommandExecutable, CamelFileName) via HTTP requests to CXF-RS or CXF-SOAP endpoints. When a route forwards messages from these endpoints to header-driven components such as camel-exec or camel-file, the injected headers override configured values, enabling remote code execution or arbitrary file writes. This is the same pattern that was previously addressed in camel-undertow (CVE-2025-30177), the broader incoming-header filter (CVE-2025-27636 and CVE-2025-29891), and non-HTTP strategies (CVE-2026-40453).


This issue affects Apache Camel: from 3.18.0 before 4.14.6, from 4.15.0 before 4.18.2.

Users are recommended to upgrade to version 4.19.0, which fixes the issue. If users are on the 4.18.x LTS releases stream, then they are suggested to upgrade to 4.18.2. If users are on the 4.14.x LTS releases stream, then they are suggested to upgrade to 4.14.6.
Published: 2026-05-19
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Apache Camel’s CXF and Knative header filters fail to block inbound Camel‑internal headers. Without the required setInFilterStartsWith configuration, an attacker can craft HTTP requests containing headers such as CamelExecCommandExecutable or CamelFileName. The unchecked value is then forwarded to message‑driven components that interpret these headers, enabling arbitrary command execution or file write operations. This flaw is an instance of CWE‑178 due to the absence of proper string length validation when processing incoming header data.

Affected Systems

The vulnerability affects Apache Camel versions 3.18.0 through 4.14.5 and 4.15.0 through 4.18.1. The vendor is the Apache Software Foundation. Users running any of these releases are at risk until they apply a patch.

Risk and Exploitability

Exploitation requires only a crafted HTTP request to a CXF‑RS or CXF‑SOAP endpoint; no authentication is needed. Although no CVSS score is published and the EPSS score is unavailable, the potential for remote code execution places the risk in the highest severity band. The vulnerability is not listed in the CISA KEV catalog, but the clear attack path and the severity of the impact warrant urgent remediation.

Generated by OpenCVE AI on May 19, 2026 at 15:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache Camel to 4.19.0; if using 4.18.x LTS upgrade to 4.18.2; if using 4.14.x LTS upgrade to 4.14.6.
  • If a patch cannot be applied immediately, enable inbound header filtering by calling setInFilterStartsWith on CxfRsHeaderFilterStrategy, CxfHeaderFilterStrategy, and KnativeHttpHeaderFilterStrategy to block Camel‑internal header names.
  • Remove or isolate camel-exec and camel-file components from routes exposed via CXF or Knative endpoints to eliminate the execution vector.
  • Monitor incoming requests for unexpected headers such as CamelExecCommandExecutable or CamelFileName and alert when they appear.

Generated by OpenCVE AI on May 19, 2026 at 15:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 13:45:00 +0000

Type Values Removed Values Added
Description Camel-CXF and Camel-Knative Message Header Injection via Missing Inbound Filtering The CXF and Knative HeaderFilterStrategy implementations (CxfRsHeaderFilterStrategy in camel-cxf-rest, CxfHeaderFilterStrategy in camel-cxf-transport, and KnativeHttpHeaderFilterStrategy in camel-knative-http) only filter outbound Camel-internal headers via setOutFilterStartsWith, while not configuring inbound filtering via setInFilterStartsWith. As a result, an unauthenticated attacker can inject Camel-internal headers (e.g. CamelExecCommandExecutable, CamelFileName) via HTTP requests to CXF-RS or CXF-SOAP endpoints. When a route forwards messages from these endpoints to header-driven components such as camel-exec or camel-file, the injected headers override configured values, enabling remote code execution or arbitrary file writes. This is the same pattern that was previously addressed in camel-undertow (CVE-2025-30177), the broader incoming-header filter (CVE-2025-27636 and CVE-2025-29891), and non-HTTP strategies (CVE-2026-40453). This issue affects Apache Camel: from 3.18.0 before 4.14.6, from 4.15.0 before 4.18.2. Users are recommended to upgrade to version 4.19.0, which fixes the issue. If users are on the 4.18.x LTS releases stream, then they are suggested to upgrade to 4.18.2. If users are on the 4.14.x LTS releases stream, then they are suggested to upgrade to 4.14.6.
Title Apache Camel: Camel-CXF Message Header Injection via Missing Inbound Filtering
Weaknesses CWE-178
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-05-19T12:25:49.373Z

Reserved: 2026-05-19T08:52:58.990Z

Link: CVE-2026-47323

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T14:16:48.653

Modified: 2026-05-19T14:23:47.477

Link: CVE-2026-47323

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T15:15:08Z

Weaknesses